dataleakvpnbruteforceHPPhishingESXVulnerabilitySmishingIngenieriaSocialWindowsVulnerabilityawsgcpTenablecloudOracleERPMALSPAMcompromisedrepositoryWifiBruteForceUnixVulneribilityAutoservicioExposedadminportsWEB APPVULNERABILITYPAN MASTERKEYVULNERABILITYQualysweakcredentialsADbruteforceoffice365dataleakvpnbruteforceHPPhishingESXVulnerabilitySmishingIngenieriaSocialWindowsVulnerabilityawsgcpTenablecloudOracleERPMALSPAMcompromisedrepositoryWifiBruteForceUnixVulneribilityAutoservicioExposedadminportsWEB APPVULNERABILITYPAN MASTERKEYVULNERABILITYQualysweakcredentialsADbruteforceoffice365

Red Team - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. data leak
  2. vpn brute force
  3. HP
  4. Phishing
  5. ESX Vulnerability
  6. Smishing
  7. Ingenieria Social
  8. Windows Vulnerability
  9. aws
  10. gcp
  11. Tenable cloud
  12. Oracle ERP
  13. MALSPAM
  14. compromised repository
  15. Wifi Brute Force
  16. Unix Vulneribility
  17. Autoservicio
  18. Exposed admin ports
  19. WEB APP VULNERABILITY
  20. PAN MASTER KEY VULNERABILITY
  21. Qualys
  22. weak credentials
  23. AD brute force
  24. office365